Blog

What does a small business want out of cyber insurance?
06.08.24 10:39 AM - Comment(s)


 

The operating system has been out of support for a full decade. The only notable public patches since then were in 2017 and 2019 for the eternalblue exploit (wannacry) and bluekeep.

 

Despite this, in 2024 an estimated 0.5% of enterprise systems still run Windows XP. There are many cas...

30.07.24 01:59 AM - Comment(s)

One of the ways we can refine security and influence energy is by looking at bug bounty programs. These are where the hardware and software vendor offer cash payouts to hackers who can demonstrate vulnerabilities in their software.

 

This creates an economic value floor on the size of organiza...

26.07.24 11:26 AM - Comment(s)

This is the golden question that determines if you'll be staying late tonight securing the network or off early to hit the links.

 

You can reframe the question into "How much influence energy does the threat represent?" By determining this, you can know if you need to add new counte...

09.07.24 02:01 AM - Comment(s)

How does the Security Energy framework relate to the Pyramid of Pain?. This influential analysis of cyber threat intelligence organizes attack attributes according to how difficult they are to change.

 

If you think this sounds a lot like Influence Energy…you are right! How does each level of ...

01.07.24 04:00 AM - Comment(s)